Microsoft recommends using a server operating system rather than a desktop operating system for the deployment of
Fantastic news! We've Found the answer you've been seeking!
Question:
- Microsoft recommends using a server operating system rather than a desktop operating system for the deployment of SQL Server. Why might the use of a desktop operating system hinder the performance of SQL Server?
- Your instructor has endeavored to emphasize the importance of security. What are some basic examples of ways to provide physical security for a SQL Server Database Management System? What can be done about logical security for the DBMS and the Data?
- Discuss the two different types of authentication available for SQL Server. What are they? What are the advantages and disadvantages of each authentication type?
- List and describe three different SQL Server authentication password policies.
- Describe how SQL Server logins function at the SQL Server instance level and how they relate to accessing the database instances.
- We have had class discussions regarding the choice of table indexes. What is an index? What are the advantages and disadvantages of using indexes? What type of data might serve as a valuable index for a table, and what types of data would be unsuitable for an index.
- Identify three of the fixed roles provided at the server instance level and explain some of their associated permissions/privileges and their ability to perform administrative tasks
- Discuss the two different types of encryption keys: Symmetric and Asymmetric. What are they used for?
- Discuss the importance of using encryption for databases that hold confidential information. What types of information should be encrypted?
- What are Database Schemas within Microsoft SQL Server? What is the advantages/disadvantages of granting permissions on a schema versus individual objects for a user or role?
- Describe the purpose of each of the following system databases in SQL Server 2012:
- Master
- Tempdb
- Model
- Msdb
- What is the importance of maintaining backups and security precautions that should be taken to protect the backups and the data they contain.
Related Book For
Posted Date: